## Discrete Logarithm Problem Partly Solved -- Time To Drop Some Crypto Methods? 114

An anonymous reader points out this Science Daily report:

*"Researchers ... have solved one aspect of the discrete logarithm problem. This is considered to be one of the 'holy grails' of algorithmic number theory, on which the security of many cryptographic systems used today is based. They have devised a new algorithm that calls into question the security of one variant of this problem, which has been closely studied since 1976. The result ... discredits several cryptographic systems that until now were assumed to provide sufficient security safeguards. Although this work is still theoretical, it is likely to have repercussions especially on the cryptographic applications of smart cards, RFID chips , etc."*
## Is Diffie Hellman at risk? (Score:5, Interesting)

I really really skimmed the article, but I think it all boils to this one algorithm. If Diffie Hellman is at risk, then all of our "perfect forward security" reliance of SSL is gone.

Shachar

## Re:Is Diffie Hellman at risk? (Score:5, Insightful)

Seeing it on slashdot means nothing. Wait till a reputable source that DOESNT have a habit of blowing everything up into a crisis reports on this-- schneier's blog would be a good place to start.

## Re:Is Diffie Hellman at risk? (Score:5, Informative)

Posted it as a question there already.

Here's the thing, however. From reading the article, it seems that DH was not, itself, broken. Here's the problem, however: DH is used for forward reference security. It is used to ensure that an adversary that captured the encrypted communication cannot be decrypted later,

even if the RSA key is later compromisedWhich means that whether DH has already been broken is a moot question. The real question is whether it is likely to be broken in the near future (where what "near" means depends on what you're actually encrypting).

Here is what Schneier usually has to say about that: Attacks always get better over time.

Of course, the main problem with replacing DH is that we don't really have anything better on hand.

Shachar

## Re: (Score:2)

I'm guessing Schneier et al won't have a chance to analyze and reply until next week, but this is so important, who knows?

It also occurred to me that, since the mess with the NSA broke out, I have not seen anything about Suite B being modified--everything in there is still officially supported for "State Secrets". I keep wondering if we're missing something there...

## Re: (Score:3)

Of course, the main problem with replacing DH is that we don't really have anything better on hand.

Actually there is no need for DH, you can create a new throwaway RSA private/public key pair on both sides, sign it with your main key, use the throwaway keys to transfer the session key then wipe the throwaway keys. The problem with this approach is that generating a new RSA key pair for every session + transferring new key + extra round trips is a really slow process compared to DH.

## Re: (Score:2)

So in other words: There actually is a real need for this... As the alternatives are cumbersome and require more resources.

Too bad computers are out of resources, and no more seem to be coming.

I think generating a key pair is less load than modern window managers.

## Re: (Score:3)

A better way to handle this would probably be to have the client generate the session key and encrypt it with the servers public key, this would distribute the load for generating keys away form the server so they would not be as easily DOS'ed.

## Re: (Score:2)

So the client can keep generating simple session keys over and over until it discovers the server's key? Sounds like a brilliant vulnerability. NSA, is that you?

Except they can already throw data at a servers public key as it is

publicalready## Re: (Score:2)

Actually there is no need for DH, you can create a new throwaway RSA private/public key pair on both sides, sign it with your main key, use the throwaway keys to transfer the session key then wipe the throwaway keys. The problem with this approach is that generating a new RSA key pair for every session + transferring new key + extra round trips is a really slow process compared to DH.

So how do you go about securely communicating one part of the throwaway keys to the other side so that the session key can be transferred?

## Re: (Score:2)

So how do you go about securely communicating one part of the throwaway keys to the other side so that the session key can be transferred?

Static RSA using the main keys. It won't have PFS, but it will only contain the public keys of the throwaway pair so recovering it later won't do you any good.

As a step process:

1. Static RSA with main keys, swap public throwaway keys.

2. Static RSA with throwaway keys

3. Negotiate session key

4. Throw away private key used in 2. immediately

5. Server is compromised, main key stolen

6. Traffic in 1. is decrypted, public keys found

7. Private keys for 2. is gone, session key can't be decrypted = perfect forward sec

## Re: (Score:2)

So, why exactly would we want to decrypt the adversary that captured some encrypted communications?

## Re:Is Diffie Hellman at risk? (Score:5, Interesting)

If Diffie Hellman is at risk, then all of our "perfect forward security" reliance of SSL is gone.

Shachar

Really, it was gone already, many times. The key generation bug, the heartbleed bug... Even if it works, it is still probably easier to exploit coding mistakes, and we seem to have enough of them.

## Re: (Score:1)

It's like religion. It's not the theory, it's the implementation that's flawed.

## Re: (Score:2)

It's like religion. It's not the theory, it's the implementation that's flawed.

I like that a lot.

## Re: (Score:2)

No, this paper is explicitly stating that the theory is flawed. If this attack is expanded, SSL traffic will essentially be as secure as rot13. That's very different and much worse than heartbleed or any key generation issue. My applications were not affected by either of those coding mistakes, but they and everything else using the same algorithm would be by a break in DH.

## Re: (Score:3)

No of course not. Ignorance is considered irresponsible, foolish, and lazy unless you're a neophyte. And while faith is desirable, faith is best based on knowledge, experience, and reason. Faith which cannot be defended by reason or evidence is considered weak and shaky, but better than no faith at all. Sharing evidences of what you have faith in is a very popular activity and is considered healthy and encouraging for all.

People seriously believe that?

## Somewhat (Score:5, Interesting)

Reading the paper, the most notable feature is that their algorithm is efficiency for constant characteristic, including the common case of fields of characteristic 2. It's also okay for the characteristic to grow somewhat with the size of the field, but not very fast.

This is not at all relevant to most implementations of DH, which use prime fields of large characteristic. For example, DSA depends on discrete log modulu a large prime p. In particular, I wouldn't worry about forward secrecy of current internet traffic.

## Re: (Score:2)

This is not at all relevant to most implementations of DH, which use prime fields of large characteristic.

Exactly. Probably more interesting is that their solution is applicable to a wider range of finite fields than recent improvements.

From the paper:

Although we insist on the case of finite fields of small characteristic, where quasi-polynomial complexity is obtained, our new algorithm improves the com- plexity of discrete logarithm computations in a much larger range of finite fields.

I see no good basis for the ScienceDaily author's leap from the paper's results to his conclusion that

Since solving this variant of the discrete logarithm is now within the capacity of current computers, relying on its difficulty for cryptographic applications is therefore no longer an option.This work is still at a theoretical stage and the algorithm still needs to be refined before it is possible to provide a practical demonstration of the weakness of this variant of the discrete logarithm. Nonetheless, these results reveal a flaw in cryptographic security and open the way to additional research. For instance, the algorithm could be adapted in order to test the robustness of other cryptographic applications.## Re: (Score:1)

What?

I was told by a scientist friend 14 years ago that diffie hellman was a sort of knapsack problem - and thus solvable in polynomial time - and that it was therefore inherently weaker than RSA. :/ could it be that this has been known for decades but not widely spread?

When I look the knapsack problem up wikipedia says it's NP hard but that many cases, including random cases are solvable in polynomial time, even though not all can.

You know, that's how decision problems for circuit verification are. While

## Re: Is Diffie Hellman at risk? (Score:2)

Knapsack is NP-complete.

## Diffie Hellman is not Knapsack (Score:2)

As somebody else pointed out, either you or the person you were talking to was thinking of Merkle-Hellman, not Diffie-Hellman.

NP-hard problems are attractive, because they take polynomial time to verify if you know the right piece of data (i.e. the key) and exponentialish time if you don't. But it turns out that there are a lot of them that either can't be usefully turned into an encryption algorithm, or usually aren't more than polynomially hard if you do, because the version of the problem that got you

## Re: (Score:2)

What this is is another argument for using long keys. The improvement doesn't appear to be sufficient to render Diffie-Hellman unusable.

## Re: (Score:2)

Er, actually the above is half an answer, and turns out to be wrong in its explanation, although not in its conclusion. Math is hard.

## Re: (Score:3)

Breaking the discrete logarithm problem breaks both DH and RSA; obtaining the private exponent from the RSA public key can be done by solving the discrete logarithm problem. However, this algorithm solves the discrete logarithm problem only for certain fields (Galois fields of small characteristic), and I don't believe those are the ones interesting for RSA or DH. (RSA uses a composite group; DH uses a prime field of large characteristic)

## Almost first post! (Score:2)

However, someone intercepted the message, cracked slashdot's https rsa key, modified this message, then submitted it on my behalf.

## Re:Almost first post! (Score:5, Interesting)

RSA does not rely on discrete log. It rather relies on discrete root.

Dlog is the base, however, to almost any other public key algorithm out there which isn't elliptic curve. This includes Diffie Hellman, El-Gamal, DSA, Schnor and I'm sure others as well.

My reading of the article is that those are not yet borken, per se (spelling mistake left in intentionally). Since Diffie Hellman is primarily used for forward reference security, however (i.e. - figuring out a session key that will not be compromised even if the private key later is), the question is not whether it is safe today. The question is whether it will remain safe for the foreseeable future.

If attacks on dlog are beginning to become practical, the answer is "less and less".

Shachar

## Re: (Score:3)

RSA does not rely on discrete log. It rather relies on discrete root.

Dlog is the base, however, to almost any other public key algorithm out there which isn't elliptic curve. This includes Diffie Hellman, El-Gamal, DSA, Schnor and I'm sure others as well.

Discrete log is certainly being used with elliptic curves. EC isn't really an algorithm, but an alternative "number system" that is well suited for crypto (the common alternative is finite/Galois fields).

## Re: (Score:2)

RSA private key is p,q,d where p and q are large primes and d is the private exponent.

RSA public key is n, e where n = pq and e is the public exponent. The private exponent d was chosen such that (m^e)^d (mod n) = m for any m (message) 0 m n.

RSA encryption is c = m^e (mod n)

RSA decryption is m = c^d (mod n)

Suppose I have an RSA public key n, e. I pick an arbitrary m and calculate

c = m ^ e (mod n)

Now I need to find d such that

m = c ^ d

## Re: (Score:2)

Dlog is the base, however, to almost any other public key algorithm out there which isn't elliptic curve.

EC algorithms (ECDH, ECDSA, ECIES) are also based ultimately on the discrete log problem. So, this news is a potential threat to essentially all of the major asymmetric crypto algorithms, excepting only RSA.

## Re: (Score:1)

However, someone intercepted the message, cracked slashdot's https rsa key, modified this message, then submitted it on my behalf.

You are aware Slashdot has an in-house analytics database that can easily correlate any AC to IP addresses, corresponding MAC addresses, logins (if any) and locations. If push comes to shove, the police can be given your ID, most likely without the need for a warrant. Just a lowly peon that never registered; not a problem, if your comments are serious enough for the labor.

## Re: (Score:2)

Your MAC address isn't visible outside your local subnet. Slashdot has no way of knowing your MAC address. (Unless perhaps you're using IPv6 without privacy extensions enabled, but I'm guessing Slashdot is years away from IPv6.)

## Re: (Score:2)

## Re: (Score:2)

var locator = new ActiveXObject("WbemScripting.SWbemLocator");

// Get the info

var service = locator.ConnectServer(".");

var properties = service.ExecQuery("SELECT * FROM Win32_NetworkAdapterConfiguration");

var e = new Enumerator (properties);

Jesus, that looks horrible. I would hope that you have to add sites to your Local Intranet zone or whatever it's calle

## Re: (Score:2)

When push comes to beta, your ID will be pushed directly to the police using JSON, most likely without the need for a cookie.

## Springer Verlag says (Score:2)

## Probably known already (Score:3)

If this is just being publicly announced now, it was probably known to NSA, the GRU, and the MSS years ago. The superpower security agencies put substantial resources into cryptanalytic number theory.

Early public key cryptosystems used the knapsack problem. That turned out to have reasonably easy solutions. Factoring products of two big primes may be all we have left. That's believed to be hard, but there's no proof of a lower bound on it.

## Re: (Score:2)

If this is just being publicly announced now, it was probably known to NSA, the GRU, and the MSS years ago. The superpower security agencies put substantial resources into cryptanalytic number theory.

I think that many people forget the NSA's other mission: securing US Government communications. The easiest way to figure out how secure an algorithm is, is to take a look at what level of information it's authorized for. Despite everything that all the folks here say, the NSA and other agencies aren't stupid. They know full well that if they can break the algorithm, somebody else can as well.

## Re: (Score:2, Interesting)

Unless they are keeping keys to the algorithm that no one else has, and which cannot be determined after the fact. This is essentially the issue that they were accused of in regards to the elliptic curve random number generator they had put forward as a standard.

## Re: (Score:1)

## Re:Probably known already (Score:5, Insightful)

No, like the [Dual EC DRBG](http://en.wikipedia.org/wiki/Dual_EC_DRBG) controversy.

I love it how people (shills?) keep bringing up DES S-boxes, as if they had anything to do with anything. The thing with DES was in 1975. Almost 40 years ago. Since then the NSA went through 10 directors, and the US through 8 presidents. And most of the staff in high positions died or retired.

It's ridiculous to try to pretend that something nice a completely different NSA did 40 years ago has the slightest relevance to today's completely different environment and politics.

## Re: (Score:2)

Yes except no one's been able to show that they actually do have the keys, or even a smoking gun of "this algorithm is always active".

What they are doing is the same wailing and knashing of teeth that happened 40 years ago.

Meanwhile it seems far more obvious that the NSA instead just relies on the CIAs direct intercept and tampering with targeted bits of hardware, rather then depending on people using a specific algorithm, with a specific set of constants, somewhere that's interesting to them and not one wh

## Re: (Score:2)

It's not relevant for judging the character of the NSA, of course, but it's HIGHLY relevant as a bit of context, when people are acting paranoid, and throwing around accusations with no evidence.

## Re: (Score:2, Insightful)

There are many other methods to send info, one time pads (number stations), steganography (lots of side channels for noise to be tampered with), couriers, stuff...

And BTW you still have to prove that NSA and all the other agencies are working for their own nation against the other nations. It may hold true at lower levels, but they don't answer to anyone by design, and it's apparent that we live in a global system where politics are a diversion.

## Re: (Score:2)

There are many other methods to send info, one time pads (number stations), steganography (lots of side channels for noise to be tampered with), couriers, stuff...

OTP needs a secure side channel the same size as the data meaning you can't just call/text/mail someone and verify a fingerprint, which makes it extremely impractical, steganography with no or weak encryption is just security by obscurity, couriers depend on the security of the courier which is just like trusting the Internet - it too is a third party courier. Without regular PKI it wouldn't be practically feasible, fortunately the basic building blocks like RSA for signing/verifying in certificates and PGP

## Re: (Score:2)

OTP needs a secure side channel the same size as the data meaning you can't just call/text/mail someone and verify a fingerprint, which makes it extremely impractical

Well that's a problem if your are already under the radar but otherwise? What if you just apply a salted hash to blocks of innocent files that you share with your pal and use them as the OTP? We all already share innocent files provably identical, the updates. Linux users routinely download compressed and signed packages those mega if not gigab

## Re: (Score:1)

Key distribution for one time pads is a nightmare. It's possible for a giovernment to send tapes of one time pads through diplomatic baggage to their embassies in advance. But it's completely useless for anyone else.

## Re: (Score:2)

Key distribution for one time pads is a nightmare. It's possible for a government to send tapes of one time pads through diplomatic baggage to their embassies in advance. But it's completely useless for anyone else.

Yeah... Mailing a flash drive is beyond the abilities of most people.

## Re: (Score:2)

Factoring primes is popular, but not at all the ONLY method:

https://en.wikipedia.org/wiki/... [wikipedia.org]

## Re: (Score:1)

> If this is just being publicly announced now, it was probably known to NSA, the GRU, and the MSS years ago.

I don't know about that. One thing that has become clear after Snowden's revelations is that the NSA has troubles with properly implemented cryptography. Whereas they no doubt have one or two tricks up their sleeve, they don't seem to be in possession of any revolutionary mathematical knowledge. They used to be years ahead of academia in cryptography, when academia was barely looking into it. That

## Re: (Score:2)

## arXiv link (to the technical paper) (Score:5, Informative)

## Re: (Score:3)

## Not much to see here. (Score:1)

The new algorithm is for small characteristics. Small characteristics have been suspect for some time and are no longer used. In fact: cryptographers are moving away from finite fields altogether in favor of elliptic curves, now that most of the relevant patents in that subject have either expired or been rendered toothlesss. No subexponential algorithm is known for the Discrete Logarithm Problem over elliptic curves.

## Re: (Score:2)

>are moving away from finite fields altogether in favor of elliptic curves

Umm, what about all the elliptic curves in finite fields?

## Re: (Score:2)

>are moving away from finite fields altogether in favor of elliptic curves Umm, what about all the elliptic curves in finite fields?

It may have been 6 years since I played with the discrete logarithm problem over elliptic curves, but aren't all the fields finite?

## Re: (Score:2)

## Re: (Score:3)

Until you try to impliment them on hardware that can exist in the real world.

## Re: (Score:3)

definedover a finite field, but there's no known connection between the discrete log problem for the field and for the elliptic curve.## Re: (Score:3)

Unless you're talking about the Dual EC DRBG.

Prime fields are safer, but they are inconvenient. Elements in a GF(2**n) field map nicely to n bits.

## It's still NP. (Score:5, Informative)

## Re: (Score:2)

He never even mentioned NP!

Au contraire, he started with it in his title for the comment: "It's still NP."## Re: (Score:1, Informative)

Please note that the algortihm is

notO(n^log(n)) but n^O(log(n)). This puts the constant factor in the exponent which is a bit worse.## Re: (Score:3, Insightful)

## Re: (Score:2)

## Re: (Score:2)

Yes, that is how I read it too. (posting to undo accidental wrong mod)

## Re:It's still NP. (Score:4, Informative)

## Re: (Score:2)

## Re: (Score:2)

A short key right now is 512 bits (0.5 KB). A longish key right now is 4096 bits (4 KB); many sites use shorter keys because high traffic sites can't afford the bandwidth and CPU required to transmit and process even a 4096 bit key for thousands of connections per second. Squaring even the short end of that range would produce a 262144 bit key (256KB). That's a ridiculous amount of data overhead just to initiate a connection, and performing math in a space that large would tax the CPU of individual computer

## Re: (Score:1)

n^log(n):

F(2^2) = 2^4 = you can probably solve it with pen and paper

F(2^3) = 2^9 = you could probably still solve it by hand if your life depended on it.

F(2^4) = 2^16 = too hard to solve by hand, but a PC could do it in less than a microsecond.

F(2^5) = 2^25 = solved in millisecond or so on a PC

F(2^6) = 2^36 = solved in a few minutes on a PC

F(2^7) = 2^49 = a little difficult to brute force, but still easily solved in half a day on a GPU.

F(2^8) = 2^64 = a server farm can solve this in a day.

F(2^9) = 2^81 = th

## Don't put Dlog to sleep so soon (Score:5, Insightful)

The result is on for fields with small characteristic, but the most commonly used finite fields in this context are the Zp for some prime p which have characteristic p.

So though this is a very interesting result, I am not tossing out all my crypto suit yet.

we should be cautiously seeking better alternatives, but the worst thing we can do is to panic and ditch well studied algorithms and implementations every time some progress is made on their cryptanalysis.

## Re: (Score:1)

Fields with small characteristic have been known weaker for eons— (including by the author of this paper's prior work). In general, its well know that prime fields have the best security story.

## Re: (Score:1)

I am not tossing out all my crypto suit yet.You might want to hold onto it. While not as cool as a cloak of invisibility, a crypto suit is still a pretty good disguise...

## Repercussion on SmartCards? (Score:4, Interesting)

## Re: (Score:2)

Were all of the asymmetric cryptosystems invalidated, smart cards would probably become dramatically more important. Everything we do with asymmetric crypto can be done with symmetric crypto (and in many cases with liberal use of trusted third parties), but key distribution becomes a much harder problem. Smart cards provide a cost-effective and reasonably-secure mechanism for key distribution.

As long as we have one secure, general-purpose asymmetric algorithm, though, I don't see much of an impact. Well,

## Re: (Score:1)

Do you know what PFS is or how it works? Clearly the answer is "NO" but you should educate yourself.

The OP is right: smartcards mostly rely on symmetric algorithms. In fact the OP never said anything about PFS, and bank cards for example, which use RSA, do not implement PFS, because it is not needed in that context.

Do you know what a smart card is and how it works? Clearly the answer is "NO" but you should educate yourself ;-)

## Hold the horses (Score:3)

Even though I didn't really understood the math, two important points stick out from their description:

As far as I understood they empirically showed their approach to work on one example. A study showing the general feasibility of the heuristics would be more convincing (yeah, that's the engineer speaking not the mathematician).

It should also be noted that the authors themselves write in their conclusion:

"Compared to existing approaches, and in particular to the line of recent works [15,10], the practical relevance of our algorithm is not clear, and will be explored by further work."So, before running to conclusions maybe we should wait for the "further work".

## Solved in Sneakers, 1992 (Score:1)

## Which crypto methods are at risk? (Score:1)

Which crypto methods are at risk?

## Re: (Score:2)

## Hype (Score:2, Interesting)

I'm a cryptographer and the paper didn't even catch my eye when I was glancing this year's Eurocrypt papers. I also haven't heard anyone talk about it at work and this is despite all my coworkers working on crypto which would break if someone came up with a fast dlog algorithm in groups used in practice. The algorithm is purely for fields of small characteristic, which means that it's totally irrelevant for most practical applications, since typically one will work over subgroup of invertible elements for t

## Re: (Score:2)

## "until now" (Score:2)

Even if this problem is actually solved, the cryptographic methods using it were sufficient "until now" if this is actually the first party solving it. Saying that they were presumed sufficient until now misses the point of cryptography. It's never impossible to recover the plaintext. The whole point is to make it take unfeasibly long with current methods except for those with the proper key. If a new method comes along to break a scheme, that means the scheme is no longer sufficient going forward. It doesn